We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.
We elaborate on reasoning in contemporary (semi) automatic parallelizing refactoring. As the main contribution we summarize contemporary approaches and show that all attempts to reason in parallelization thus far, hav...
详细信息
We elaborate on reasoning in contemporary (semi) automatic parallelizing refactoring. As the main contribution we summarize contemporary approaches and show that all attempts to reason in parallelization thus far, have amounted to local code analysis given data and control dependencies. We conclude that, by retaining this perspective only, parallelization continues to exploit merely a subset of the reasoning methods available today and is likely to remain limited. To address this problem we suggest to expand the local analyses, such that, they take seriously relations between individual local parallelizing transformations. We argue that such a coupling allows to process sparser parallelizable constructs, such as, producer-consumer coordination. We identify questions to be addressed to put this principle into action and report on-going work on (reasoning) mechanisms able to support this.
In this paper, a new multipurpose Lightweight Grid (LWG) system is introduced, under the acronym Computational Basic Reprogrammable Adaptive (CoBRA) grid. It provides the functionality grid users require, and offers g...
详细信息
The advent of multicore processors has raised new demand for harnessing concurrency in the software mass market. We summarise our previous work on the data parallel, functional array processing language SaC. Its compi...
详细信息
ISBN:
(纸本)1595936904
The advent of multicore processors has raised new demand for harnessing concurrency in the software mass market. We summarise our previous work on the data parallel, functional array processing language SaC. Its compiler technology is geared towards highly runtime-efficient support for shared memory multiprocessors and, thus, is readily applicable to today's off-the-shelf multicore systems. Copyright 2007 ACM.
This paper describes a new solution method applied to the problem initializing DAEs using the Modelica language. Modelica is primarily an object- oriented equ-tion-based modeling language that allows specification of ...
详细信息
This paper describes a new solution method applied to the problem initializing DAEs using the Modelica language. Modelica is primarily an object- oriented equ-tion-based modeling language that allows specification of mathematical models of complex natural or man-made systems. Major features of Modelica are the multidomain modeling capability and the reusability of model components corresponding to physical objects, which allow to build and simulate highly complex systems. However, initializing such models has been quite cumbersome, since initial equations have to be pro-vided at the system level, where the user needs to know details on the underlying transformation and index-reduction algorithms, that in general are applied to simulate a Modelica model.
An important aspect of system support for mobile computing involves alleviating the issues related to programming the underlying distributed system. Our approach to dealing with these issues is by means of programming...
详细信息
We take a step forward towards invasive parallelization of sequential programs, where invasiveness amounts to weaving of parallel code into sequential cores on adaptable composition interfaces. In this paper we sugges...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes (1990). We show that their notion of quiescence as a necessary and suffici...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes (1990). We show that their notion of quiescence as a necessary and sufficient condition for safe runtime changes is too strict and violates the black-box design principle. We introduce a weaker condition, tranquility; easier to obtain, less disruptive for the system and still sufficient to ensure application consistency. We also present an implementation of this concept in a component middleware platform
暂无评论